NPTEL Ethical Hacking Assignment 7 Answers 2023

Hello NPTEL Learners, In this article, you will find NPTEL Ethical Hacking Assignment 7 Week 7 Answers 2023. All the Answers are provided below to help the students as a reference don’t straight away look for the solutions, first try to solve the questions by yourself. If you find any difficulty, then look for the solutions.

NPTEL Ethical Hacking Assignment 8 Answers 2023 Join Group👇
NPTEL Principles of Management Assignment 1 Answers 2023

Note: We are trying to give our best so please share with your friends also.

COURSE NAMEANSWER
NPTEL Ethical Hacking Assignment 1 AnswersClick Here
NPTEL Ethical Hacking Assignment 2 AnswersClick Here
NPTEL Ethical Hacking Assignment 3 AnswersClick Here
NPTEL Ethical Hacking Assignment 4 AnswersClick Here
NPTEL Ethical Hacking Assignment 5 AnswersClick Here
NPTEL Ethical Hacking Assignment 6 AnswersClick Here
NPTEL Ethical Hacking Assignment 7 AnswersClick Here
NPTEL Ethical Hacking Assignment 8 AnswersClick Here
NPTEL Ethical Hacking Assignment 9 AnswersClick Here
NPTEL Ethical Hacking Assignment 10 AnswersClick Here
NPTEL Ethical Hacking Assignment 11 AnswersClick Here
NPTEL Ethical Hacking Assignment 12 AnswersClick Here
NPTEL Ethical Hacking Assignment 7 Answers 2023
NPTEL Ethical Hacking Assignment 7 Answers 2023

NPTEL Ethical Hacking Assignment 7 Answers 2023:

We are updating answers soon Join Group for update: CLICK HERE

Q.1. Consider a hash function H that generates hash values h1 and h2, when fed with messages m1 and m2 respectively. Which of the following options can never be true?

  • a. h1 and h2 are equal, but m1 and m2 are unequal.
  • b. m1 and m2 are equal, but h1 and h2 are unequal.
  • c. None of these.

Q.2. What is meant by collision in the context of hashing?

  • a. More than one different message can generate the same hash value.
  • b. After encryption, the ciphertexts corresponding to two or more plaintexts are the same.
  • c. The hash function generates the all zero string as the hash value.
  • d. None of these.

Q.3. A message M is fed to a hash function HASH to generate the hash value H:

H = HASH (M) Which of the following statements is true?

  • a. The number of bits in H is much larger than the number of bits in M.
  • b. The number of bits in H and M are almost equal.
  • c. The number of bits in M is much larger than the number of bits in H.
  • d. None of these.
NPTEL Ethical Hacking Assignment 7 Answers Join Group👇

Q.4. What of the following does not correspond to the first preimage resistance in the context of hash functions?

  • a. It is difficult to find a message M such that HASH(M) = H, except for a few hash values H.
  • b. Given a message M1, it is difficult to find another message M2 such that HASH(M1) HASH(M2).
  • c. It is difficult to find two messages M1 and M2 such that HASH(M1) and HASH(M2) and unequal.
  • d. None of these.

Q.5. Which of the following statement(s) is/are true?

  • a. Hashing realizes a one-to-one mapping.
  • b. Encryption realizes a one-to-one mapping.
  • c. Hashing realizes a many-to-one mapping.
  • d. Encryption realizes a many-to-one mapping.

Q.6. Which of the following are hash functions?

  • a. MD5
  • b. Triple-DES
  • C. SHA-1
  • d. AES

Q.7. Which of the following statement(s) is/are true?

  • a. Computing a hash function is faster than computing symmetric-key encryption.
  • b. Computing public-key encryption is slower than computing symmetric-key encryption.
  • c. Computing public-key encryption is slower than computing hash function.
  • d. Both public-key and symmetric-key encryption take approximately the same time.
NPTEL Ethical Hacking Week 7 Assignment 7 Answers Join Group👇
CLICK HERE

Q.8. What are the block size and key size of the DES algorithm?

  • a. 64 bits, 56 bits
  • b. 56 bits, 64 bits
  • c. 64 bits, 64 bits
  • d. 64 bits, 128 bits

Q.9. What kinds of algorithms are typically used in the computation of digital signature?

  • a. Cryptographic hash function.
  • b. Symmetric-key encryption.
  • c. Biometric authentication.
  • d. All of these

Q.10. The SSL record protocol is responsible for

  • a. High-speed data transmission
  • b. Data authentication
  • c. Non repudiation
  • d. None of these
NPTEL Ethical Hacking Assignment 7 Answers Join Group👇

Disclaimer: This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by Chase2learn. This tutorial is only for Discussion and Learning purpose.

About NPTEL Ethical Hacking Course:

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them.

Course Layout:

  • Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
  • Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
  • Week 3:   Routing protocols. IP version 6.
  • Week-4:   Installation of attacker and victim system. Information gathering using advanced google search, archive.org, netcraft, whois, host, dig, dnsenum and NMAP tool.
  • Week-5:  Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment System Hacking: password cracking, privilege escalation, application execution. Malware and Virus. ARP spoofing and MAC attack.
  • Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
  • Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
  • Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email security.
  • Week-9:   Packet sniffing using wireshark and burpsuite, password attack using burp suite. Social engineering attacks and Denial of service attacks.
  • Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.
  • Week-11: Different types of attacks using Metasploit framework: password cracking, privilege escalation, remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site scripting.
  • Week 12: Case studies: various attacks scenarios and their remedies.
CRITERIA TO GET A CERTIFICATE:

Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

If you have not registered for exam kindly register Through https://examform.nptel.ac.in/

Join Our Telegram Group:- CLICK HERE

Sharing Is Caring

Leave a Comment